General
-
Target
47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4
-
Size
3.4MB
-
Sample
220521-eaj7pscbbn
-
MD5
02bd574acaf76417979a5f5fbb96d15c
-
SHA1
342c23c79889441ce03c98ed243cbf417702e7bd
-
SHA256
47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4
-
SHA512
ba0332666e6f6a0b66de3673e7e6e0862db57e0d328edf2e53c1386ca55e6b3dcaa03f329397491eb5bb1576a6525d237f6c89804d78aec8a81fb149899b9717
Static task
static1
Behavioral task
behavioral1
Sample
47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4
-
Size
3.4MB
-
MD5
02bd574acaf76417979a5f5fbb96d15c
-
SHA1
342c23c79889441ce03c98ed243cbf417702e7bd
-
SHA256
47f58f0fd6e44f0cde69b3e3ce6d33106dfd31dff716d7679d4d72936cd46db4
-
SHA512
ba0332666e6f6a0b66de3673e7e6e0862db57e0d328edf2e53c1386ca55e6b3dcaa03f329397491eb5bb1576a6525d237f6c89804d78aec8a81fb149899b9717
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-